DLA Piper Ransomware Hack: What Can We Learn From It?20170726155647
DLA Piper Ransomware Hack: What Can We Learn From It?
The Incident On June 27, DLA Piper LLP, one of the largest law firms in the world, was hit by a ransomware attack that infected hundreds of thousands ...
5 Secure File Sharing Features Your Solution Must Have20170615192508
5 Secure File Sharing Features Your Solution Must Have
Sammi PunJune 15, 2017collaboration, cyber security, cybersecurity, data leak, data loss, encryption, file sharing, online collaboration, online security, secure file sharing, security, security breach0 comments
Collaboration within a business is absolutely vital to the workflow of an organization. File sharing and information exchange is a core component of t...
How to Build a Cyber Security Culture at Your Firm20170524213435
How to Build a Cyber Security Culture at Your Firm
Sammi PunMay 24, 2017bring your own device, BYOD, cloud computing, Cloud security, collaboration, cyber security, cybersecurity, data breaches, data leak, data loss, ebook, email, encryption, file sharing, information security, secure file sharing, security, security breach, small medium business, SMB0 comments
Implementing a working culture of cyber security is difficult. Compliance is complex and rolling out a complete system and nailing out all the details...
The Three Largest Data Breaches of 201420150408145243
The Three Largest Data Breaches of 2014
Did your organization suffer a data breach last year? Across all industries, information security needs to be a priority – but unfortunately, it often...
Benefits of Two-Factor Authentication20140417091458
Benefits of Two-Factor Authentication
Olga LioudvinevitchApril 17, 2014account, Ben Sapiro, HIPAA, LTN, secure network, two factor authentication, two-step verification0 comments
Over the weekend I had the pleasure of reading an article in Law Technology News last week called Developing a Strategy to Protect Client Confidential...
Do you need to up your Online Privacy Knowledge?20130822134853
Do you need to up your Online Privacy Knowledge?
Tony Abou-AssalehAugust 22, 2013HTTP, HTTPS, online privacy, password, password protection, Secure Sockets Layer, social network, SSL0 comments
No matter how much we try to fight it, summer is quickly coming to a close. Vacations are wrapping up, nights are getting cooler and students are head...
How to Protect Yourself from Identity Theft20130819082641
How to Protect Yourself from Identity Theft
Tony Abou-AssalehAugust 19, 2013Department of Justice, DOJ, identity fraud, identity theft, RCMP, Royal Canadian Mounted Police0 comments
Identity theft used to be an event out of the movies, something that only happened in a Hollywood blockbuster spy flick. Unfortunately it’s a relative...
10 Ways to Enhance your Online Privacy20130808135708
10 Ways to Enhance your Online Privacy
Tony Abou-AssalehAugust 8, 2013hacker, password, privacy, privacy settings, secure file sharing0 comments
There’s a lot of discussion surrounding online privacy, whether there is such a thing and if so, the steps that people can take to protect thems...
What is the Value of your Online Privacy?20130709140354
What is the Value of your Online Privacy?
Tony Abou-AssalehJuly 9, 2013credit card fraud, digital privacy, identity theft, mashable, online privacy0 comments
Your identity is one of your most valuable assets. It’s what makes you, you. At a personal level, it is comprised of all the components that your frie...